The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
This paper compares the utilization of ConceptNet and WordNet in query expansion. Spreading activation selects candidate terms for query expansion from these two resources. Three m...
The standard approach to speaker verification is to extract cepstral features from the speech spectrum and model them by generative or discriminative techniques. We propose a nov...
Due to attenuation and spatial smoothing that occurs in the conducting media, the bioelectric inverse problem of estimating sources from remote measurements is ill-posed and solut...
Yesim Serinagaoglu, Dana H. Brooks, Robert S. MacL...
— Underground mine galleries can be considered as complex transmission lines where multipath, attenuation, reflection, diffraction and scattering effects are dominants. However, ...
Abdellah Chehri, Paul Fortier, Pierre-Martin Tardi...